In association with heise online

27 July 2011, 12:16

ICQ vulnerable to account theft - Update

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

ICQ Logo

In security advisories for ICQ and the ICQ web site, security researcher Levent Kayan warns that both the ICQ instant messenger for Windows and the ICQ web site contain vulnerabilities that potentially allow attackers to take control of a user's ICQ account. According to Kayan ICQ doesn't adequately check user's profile information and fails properly to analyse status messages, which can be freely chosen by users, to see if they contain executable code. Kayan recently discovered a similar hole in the Skype client.


Zoom A cross-site scripting hole enables attackers to deposit JavaScript code in their ICQ profiles.

If the victim opens the attacker's profile in the ICQ client or on the ICQ web site, the embedded JavaScript code stored on the ICQ server will be executed. This can allow attackers, for example, to steal victims' cookies and take control of their sessions. The script code appears to be executed in a local context: therefore, attackers can potentially also execute applications and read the user's local files.

Such an attack is called a persistent cross-site scripting attack; the attacker manages to place JavaScript code on a server that will be executed on the victim's machine when a particular web site is visited or a particular application is used. When asked by The H's German associates at heise Security, ICQ's press office didn't want to comment on the problem. heise Security managed to reproduce the problem with the current version 7.5 of ICQ under Windows 7.

Update: ICQ's PR company has told heise Security that the developers have identified the problem and are "well on the way" to fixing it.

(ehe)

Print Version | Send by email | Permalink: http://h-online.com/-1286231
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit